Analysis
-
max time kernel
113s -
max time network
116s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
17-01-2023 08:36
Static task
static1
Behavioral task
behavioral1
Sample
OUTSTANDING INVOICE20222.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
OUTSTANDING INVOICE20222.exe
Resource
win10v2004-20221111-en
General
-
Target
OUTSTANDING INVOICE20222.exe
-
Size
691KB
-
MD5
bbcf4c3eb99f83a44a33756f4d60c510
-
SHA1
451a5e797841a7efd3b6ed5508cdda7f158bc9c3
-
SHA256
bdf40e1a0b438ef4e304c034b2c10f0226cb710a824a12cada02557b49164654
-
SHA512
e48a9db5e2461b1dbde60bd21c9a50c927566cee311c2984f3a3efa937b4a1c3f82ab50bd1752892a037c1c0a2ae689a66c7c0a265b4b5d7846a16097c394797
-
SSDEEP
12288:d2m8Pf2ZlA+wwanu0b2idzV+ngRe2Ai6hWLKmGOGwgNoexY/NTlEc:d2Aewa32irRO/QLowgNNx8NTl5
Malware Config
Extracted
lokibot
http://171.22.30.164/prime1/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
OUTSTANDING INVOICE20222.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook OUTSTANDING INVOICE20222.exe Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook OUTSTANDING INVOICE20222.exe Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook OUTSTANDING INVOICE20222.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
OUTSTANDING INVOICE20222.exedescription pid process target process PID 1320 set thread context of 1744 1320 OUTSTANDING INVOICE20222.exe OUTSTANDING INVOICE20222.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
OUTSTANDING INVOICE20222.exepid process 1744 OUTSTANDING INVOICE20222.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
OUTSTANDING INVOICE20222.exedescription pid process Token: SeDebugPrivilege 1744 OUTSTANDING INVOICE20222.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
OUTSTANDING INVOICE20222.exedescription pid process target process PID 1320 wrote to memory of 1744 1320 OUTSTANDING INVOICE20222.exe OUTSTANDING INVOICE20222.exe PID 1320 wrote to memory of 1744 1320 OUTSTANDING INVOICE20222.exe OUTSTANDING INVOICE20222.exe PID 1320 wrote to memory of 1744 1320 OUTSTANDING INVOICE20222.exe OUTSTANDING INVOICE20222.exe PID 1320 wrote to memory of 1744 1320 OUTSTANDING INVOICE20222.exe OUTSTANDING INVOICE20222.exe PID 1320 wrote to memory of 1744 1320 OUTSTANDING INVOICE20222.exe OUTSTANDING INVOICE20222.exe PID 1320 wrote to memory of 1744 1320 OUTSTANDING INVOICE20222.exe OUTSTANDING INVOICE20222.exe PID 1320 wrote to memory of 1744 1320 OUTSTANDING INVOICE20222.exe OUTSTANDING INVOICE20222.exe PID 1320 wrote to memory of 1744 1320 OUTSTANDING INVOICE20222.exe OUTSTANDING INVOICE20222.exe PID 1320 wrote to memory of 1744 1320 OUTSTANDING INVOICE20222.exe OUTSTANDING INVOICE20222.exe PID 1320 wrote to memory of 1744 1320 OUTSTANDING INVOICE20222.exe OUTSTANDING INVOICE20222.exe -
outlook_office_path 1 IoCs
Processes:
OUTSTANDING INVOICE20222.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook OUTSTANDING INVOICE20222.exe -
outlook_win_path 1 IoCs
Processes:
OUTSTANDING INVOICE20222.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook OUTSTANDING INVOICE20222.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\OUTSTANDING INVOICE20222.exe"C:\Users\Admin\AppData\Local\Temp\OUTSTANDING INVOICE20222.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\OUTSTANDING INVOICE20222.exe"C:\Users\Admin\AppData\Local\Temp\OUTSTANDING INVOICE20222.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1744